Book description
Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization? The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution. This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH). New features in the second edition include SSH, which is a popular VPN solution for Unix systems, and an expanded description of the IPSec standard, for which several vendors have announced support. Topics include:
How the VPN compares to other available networking technologies
Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work
Point to Point Tunneling Protocol (PPTP) and L2TP
The Altavista Tunnel
The Cisco PIX Firewall
Secure Shell (SSH)
Maintenance and troubleshooting
Table of contents
-
Virtual Private Networks, 2nd Edition
- Preface
- 1. Why Build a Virtual Private Network?
- 2. Basic VPN Technologies
- 3. Wide Area, Remote Access, and the VPN
- 4. Implementing Layer 2 Connections
-
5. Configuring and Testing Layer 2 Connections
- Installing and Configuring PPTP on a Windows NT RAS Server
- Configuring PPTP for Dial-up Networking on a Windows NT Client
- Configuring PPTP for Dial-up Networking on a Windows 95 or 98 Client
- Enabling PPTP on Remote Access Switches
- Making the Calls
- Troubleshooting Problems
- Using PPTP with Other Security Measures
- 6. Implementing the AltaVista Tunnel 98
-
7. Configuring and Testing the AltaVista Tunnel
- Getting Busy
- Installing the AltaVista Tunnel
- Configuring the AltaVista Tunnel Extranet and Telecommuter Server
- Configuring the AltaVista Telecommuter Client
- Troubleshooting Problems
- 8. Creating a VPN with the Unix Secure Shell
- 9. The Cisco PIX Firewall
- 10. Managing and Maintaining Your VPN
- 11. A VPN Scenario
- A. Emerging Internet Technologies
- B. Resources, Online and Otherwise
- Index
- Colophon
Product information
- Title: Virtual Private Networks, Second Edition
- Author(s):
- Release date: December 1998
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781565925298
You might also like
book
Building Microservices, 2nd Edition
As organizations shift from monolithic applications to smaller, self-contained microservices, distributed systems have become more fine-grained. …
video
Java SE 17 Developer (1Z0-829)
21+ Hours of Video Instruction An intensive and guided video course to learn and practice while …
book
Web Application Security
While many resources for network and IT security are available, detailed knowledge regarding modern web application …
audiobook
Fall in Love with the Problem, Not the Solution
Unicorns-companies that reach a valuation of more than $1 billion-are rare. Uri Levine has built two. …